Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe
Resource
win10v2004-20240412-en
General
-
Target
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe
-
Size
1005KB
-
MD5
c0bee5d054345131355452ef0c057697
-
SHA1
0edf5e5feae982f3c564875ee01f82e5068f94ac
-
SHA256
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0
-
SHA512
abcdbf6461117eeac77ea6f34431a9660dfeb643799d10e687d661c3e243302c771d3a590998e206a46addbf1ec1a58396d57d41ab0a804c960aed396bfb127e
-
SSDEEP
12288:wbWIqB/A1gv9XQ7ZNlZDV3LEWI+Xx+uBW6y4qNmh4:wbyxv9XQ7B3oWI+XHW6y4g
Malware Config
Extracted
C:\Program Files (x86)\Adobe\akira_readme.txt
akira
https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion
https://akiralkzxzq2dsrzsrvbr2xgbbu2wgsmxryd4csgfameg52n7efvr2id.onion
Signatures
-
Akira
Akira is a ransomware first seen in March 2023 and targets several industries, including education, finance, real estate, manufacturing, and consulting.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5040 3036 powershell.exe -
Renames multiple (8389) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
Processes:
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 31 IoCs
Processes:
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exedescription ioc process File opened for modification C:\Users\Public\Downloads\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\Documents\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Links\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\Videos\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Public\Music\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Users\Admin\Music\desktop.ini 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe -
Drops file in Program Files directory 64 IoCs
Processes:
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\CardUIBkg.scale-400.HCBlack.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\1851_40x40x32.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-96.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MANIFEST.XML 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_Eye.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio_Model_CX.winmd 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteWideTile.scale-200.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\ui-strings.js 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_COL.HXT 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_2019.729.2301.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\[email protected] 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_contrast-black.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-64.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosMedTile.scale-200.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_scale-200.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\about_Mocking.help.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\Exist.Tests.ps1 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-white\LargeTile.scale-125.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\SmallTile.scale-125.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\WorldClockLargeTile.contrast-black_scale-200.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\inline-error-2x.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\MicrosoftSolitaireAppList.targetsize-256_altform-unplated_devicefamily-colorfulunplated.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-30_altform-colorize.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-256_altform-unplated_contrast-white_devicefamily-colorfulunplated.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-gb\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pt-br\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\PSGet.Resource.psd1 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\Microsoft Office\root\Integration\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files (x86)\Common Files\System\ja-JP\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-200_contrast-high.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-80_altform-lightunplated.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\AppStore_icon.svg 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\Exist.ps1 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Common Files\System\ado\msado26.tlb 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ppd.xrm-ms 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_contrast-black.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Advanced-Light.scale-200.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\css\main-selector.css 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\de-de\ui-strings.js 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Extensions\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\Microsoft Office\root\Office16\dd0bcc0d47e52a03b237ea6b549d5d57.arika 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sk-sk\ui-strings.js 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_checkbox_selected_18.svg 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Extreme Shadow.eftx 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\zh-CN\View3d\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-32_altform-colorize.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyView-Dark.scale-200.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-white\akira_readme.txt 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hu-hu\ui-strings.js 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\rhp_world_icon_hover_2x.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File created C:\Program Files\Microsoft Office\root\Office16\f7b442c1ded49f6fc1258a3755450734.arika 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL108.XML 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Checkmark.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\offlineStrings.js 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Standard.targetsize-24_contrast-white.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\LargeTile.scale-200_contrast-white.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\plugin.X.manifest 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\StopwatchSmallTile.contrast-white_scale-100.png 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exepowershell.exepid process 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 5040 powershell.exe 5040 powershell.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe 2256 976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 5040 powershell.exe Token: SeBackupPrivilege 2236 vssvc.exe Token: SeRestorePrivilege 2236 vssvc.exe Token: SeAuditPrivilege 2236 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe"C:\Users\Admin\AppData\Local\Temp\976f3bd36844a826e70065762e85242105420f8c2e8b755fb29c1de0b604d0d0.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"1⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a766a6c07d10083c87a70be5a653cec6
SHA1c8ab2cc3c22647fcd13a1e1e941cdd572bd2f2a4
SHA25684e4bc8db700aaaea9506bfd9df90780337062abd36e37b541deec93c853ae04
SHA5123f4a4fafb235b7a1ffa63cef4435ace186837cda6e69d42c46c0b4218189a5436c9c7958490c48cd0f12d6e953ef742bf859866ac8fa26394f38258e46e7cf4a
-
Filesize
3KB
MD52f6bcd7d5af2c5dba8472c522e4304b8
SHA1a0964ac96ad9cd212ce21d83224ffce40cc54e40
SHA256a0e15447a9b11fbe6d947b1f77c01905626bdff5b2e3fe2c81ff80d6fc5f24a5
SHA5123d13a4eb543c7831827f154db13f7597ebbc06214b4170697fdeacee7ce53ef8ce5c35add64bb349001f2e56669da4e30b1c36dd9d3e1f9e8252051afae0b387
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82